<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>question Re: acessing the STORM UI with HDP 2.3 Kerberized cluster. in Support Questions</title>
    <link>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94721#M58111</link>
    <description>&lt;OL&gt;
&lt;LI&gt;Make sure ui kerberos auth to local rules are configured properly.  Once principle from AD is used for negotiation with MIT KDC, there need to be a rule that translate it to local account in Storm UI node.  Many times those can be copied from core-site.xml.  For example:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;ui.filter.params:"type": "kerberos""kerberos.principal": "HTTP/nimbus.witzend.com""kerberos.keytab": "/vagrant/keytabs/http.keytab""kerberos.name.rules": "RULE:[2:$1@$0]([jt]t@.*EXAMPLE.COM)s/.*/$MAPRED_USER/ RULE:[2:$1@$0]([nd]n@.*EXAMPLE.COM)s/.*/$HDFS_USER/DEFAULT"&lt;/P&gt;&lt;P&gt;Note that rules are listed as string without commas.&lt;/P&gt;&lt;P&gt;2. You will need to create mapping for MIT Domain KDC and correlated resource used for the Domain, in this case Storm UI.  You will need to execute following commands on Windows workstation from the command line:&lt;/P&gt;&lt;P&gt;ksetup /AddKDC $DOMAIN $KDC &lt;/P&gt;&lt;P&gt;ksetup /AddHostToRealmMap $hadoop_resource $Domain&lt;/P&gt;&lt;P&gt;Note that this adds registry entries in:&lt;/P&gt;&lt;P&gt;HKLM\System\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm&lt;/P&gt;&lt;P&gt;If you need to troubleshoot the issues you can try accessing Storm UI within the cluster using curl command.  For example:&lt;/P&gt;&lt;P&gt;curl -i --negotiate -u:anyUser -b ~/cookiejar.txt -c ~/cookiejar.txt &lt;A href="http://storm-ui-hostname:8080/api/v1/cluster/summary"&gt;http://storm-ui-hostname:8080/api/v1/cluster/summary&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This will be helpful to see if kerberos UI configs are working.&lt;/P&gt;&lt;P&gt;In order to isolate the issue you can use storm service keytabs as well as user principles.  &lt;/P&gt;&lt;P&gt;Another important thing to check is to make sure that trust is working properly and encryption types match on both KDCs.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Oct 2015 06:52:50 GMT</pubDate>
    <dc:creator>schintalapani</dc:creator>
    <dc:date>2015-10-02T06:52:50Z</dc:date>
    <item>
      <title>acessing the STORM UI with HDP 2.3 Kerberized cluster.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94720#M58110</link>
      <description>&lt;P&gt;All users are defined locally without any AD integration. The cluster is Kerberized on HDP 2.3 and Ambari 2.1.0. The knit fails as follow:&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;kinit: krb5_init_creds_set_keytab: Failed to find kafka/&lt;A href="mailto:hdpblv10.t-mobile.lab@T-MOBILE.LAB"&gt;hdpblv10.t-mobile.lab@T-MOBILE.LAB&lt;/A&gt; in keytab FILE:/etc/security/keytabs/kafka.service.keytab (unknown enctype) .&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The Storm UI uses SPNEGO AUTH when in Kerberos mode. Before accessing the UI, you have to we configured our browser for SPNEGO authorization before accessing the UI as follow:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Safari: &lt;/STRONG&gt;
no changes needed. 
&lt;STRONG&gt;Firefox: &lt;/STRONG&gt;
1) Go to about:config and search for network.negotiate-auth.trusted-uris. 
2) Double-click and add the following value: "&lt;A href="http://storm-ui-hostname:ui-port/"&gt;http://storm-ui-hostname:ui-port&lt;/A&gt;" 
3) Replace the storm-ui-hostname with the hostname where your UI is running. 
4) Replace the ui-port with the Storm UI port. 
&lt;STRONG&gt;Google-chrome: &lt;/STRONG&gt;
from the command line, issue: 
google-chrome --auth-server-whitelist="storm-ui-hostname" --auth-negotiate-delegate-whitelist="storm-ui-hostname" 
&lt;STRONG&gt;Internet Explorer: &lt;/STRONG&gt;
1) Configure trusted websites to include "storm-ui-hostname". 
2) Allow negotiation for the UI website. 
 &lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 06:48:55 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94720#M58110</guid>
      <dc:creator>ddubeau1</dc:creator>
      <dc:date>2015-10-02T06:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: acessing the STORM UI with HDP 2.3 Kerberized cluster.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94721#M58111</link>
      <description>&lt;OL&gt;
&lt;LI&gt;Make sure ui kerberos auth to local rules are configured properly.  Once principle from AD is used for negotiation with MIT KDC, there need to be a rule that translate it to local account in Storm UI node.  Many times those can be copied from core-site.xml.  For example:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;ui.filter.params:"type": "kerberos""kerberos.principal": "HTTP/nimbus.witzend.com""kerberos.keytab": "/vagrant/keytabs/http.keytab""kerberos.name.rules": "RULE:[2:$1@$0]([jt]t@.*EXAMPLE.COM)s/.*/$MAPRED_USER/ RULE:[2:$1@$0]([nd]n@.*EXAMPLE.COM)s/.*/$HDFS_USER/DEFAULT"&lt;/P&gt;&lt;P&gt;Note that rules are listed as string without commas.&lt;/P&gt;&lt;P&gt;2. You will need to create mapping for MIT Domain KDC and correlated resource used for the Domain, in this case Storm UI.  You will need to execute following commands on Windows workstation from the command line:&lt;/P&gt;&lt;P&gt;ksetup /AddKDC $DOMAIN $KDC &lt;/P&gt;&lt;P&gt;ksetup /AddHostToRealmMap $hadoop_resource $Domain&lt;/P&gt;&lt;P&gt;Note that this adds registry entries in:&lt;/P&gt;&lt;P&gt;HKLM\System\CurrentControlSet\Control\Lsa\Kerberos\HostToRealm&lt;/P&gt;&lt;P&gt;If you need to troubleshoot the issues you can try accessing Storm UI within the cluster using curl command.  For example:&lt;/P&gt;&lt;P&gt;curl -i --negotiate -u:anyUser -b ~/cookiejar.txt -c ~/cookiejar.txt &lt;A href="http://storm-ui-hostname:8080/api/v1/cluster/summary"&gt;http://storm-ui-hostname:8080/api/v1/cluster/summary&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This will be helpful to see if kerberos UI configs are working.&lt;/P&gt;&lt;P&gt;In order to isolate the issue you can use storm service keytabs as well as user principles.  &lt;/P&gt;&lt;P&gt;Another important thing to check is to make sure that trust is working properly and encryption types match on both KDCs.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 06:52:50 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94721#M58111</guid>
      <dc:creator>schintalapani</dc:creator>
      <dc:date>2015-10-02T06:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: acessing the STORM UI with HDP 2.3 Kerberized cluster.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94722#M58112</link>
      <description>&lt;P&gt;Regarding the kinit error.  Did you execute this manually on the client host or was the error message retrieved from a log file a node in the cluster?&lt;/P&gt;&lt;P&gt;If you received this message while kinit-ing manually on your client host, why are you attempting to authenticate using a service principal, rather than your user principal?  &lt;/P&gt;&lt;P&gt;Can you list the contents of the keytab file?  &lt;/P&gt;&lt;PRE&gt;klist -kte /etc/security/keytabs/kafka.service.keytab&lt;/PRE&gt;&lt;P&gt;Does it contain entries different than the hdfs keytab file?&lt;/P&gt;&lt;PRE&gt;klist -kte /etc/security/keytabs/hdfs.headless.keytab&lt;/PRE&gt;&lt;P&gt;Both listings should have the same number of keytab entries with the same encryption types. For example:&lt;/P&gt;&lt;PRE&gt;Keytab name: FILE:/etc/security/keytabs/hdfs.headless.keytab
KVNO Timestamp         Principal
---- ----------------- ----------------------------------------------
   1 10/02/15 10:19:29 hdfs-c1@EXAMPLE.COM (aes128-cts-hmac-sha1-96)
   1 10/02/15 10:19:29 hdfs-c1@EXAMPLE.COM (arcfour-hmac)
   1 10/02/15 10:19:29 hdfs-c1@EXAMPLE.COM (des3-cbc-sha1)
   1 10/02/15 10:19:29 hdfs-c1@EXAMPLE.COM (des-cbc-md5)
   1 10/02/15 10:19:29 hdfs-c1@EXAMPLE.COM (aes256-cts-hmac-sha1-96)&lt;/PRE&gt;</description>
      <pubDate>Fri, 02 Oct 2015 17:24:20 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94722#M58112</guid>
      <dc:creator>rlevas</dc:creator>
      <dc:date>2015-10-02T17:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: acessing the STORM UI with HDP 2.3 Kerberized cluster.</title>
      <link>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94723#M58113</link>
      <description>&lt;P&gt;These were the steps I used to get the Storm UI working on my Mac on kerborized HDP 2.3 (search for 'Open kerborized browser'):&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/abajwa-hw/security-workshops/blob/master/Setup-ranger-23.md#setup-storm-plugin-for-ranger"&gt;https://github.com/abajwa-hw/security-workshops/blob/master/Setup-ranger-23.md#setup-storm-plugin-for-ranger&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Oct 2015 18:56:56 GMT</pubDate>
      <guid>https://community.cloudera.com/t5/Support-Questions/acessing-the-STORM-UI-with-HDP-2-3-Kerberized-cluster/m-p/94723#M58113</guid>
      <dc:creator>abajwa</dc:creator>
      <dc:date>2015-10-02T18:56:56Z</dc:date>
    </item>
  </channel>
</rss>

